The most extensive identity protection plan available

Similar documents
Identity Theft & Fraud Protection

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

How to Keep Your Personal Information Secure

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

PCI Compliance. What is it? Who uses it? Why is it important?

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Portal User Guide Member Features

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

June 2012 First Data PCI RAPID COMPLY SM Solution

Protect Yourself From. Identify Theft

Personal Cybersecurity

What FinAid offices need to know about cyberattacks. Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, EST

DON IT Conference East Coast How the DON is protecting Your Privacy

Cyber Security Guide. For Politicians and Political Parties

IntegraFlex Employee Portal. Simplify your healthcare finances with convenience, online access to your tax-advantaged benefit account

Mobile Wallet Service Terms and Conditions

Cyber Hygiene Guide. Politicians and Political Parties

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Apple Pay FREQUENTLY ASKED QUESTIONS

Employee Security Awareness Training

University of North Texas System Administration Identity Theft Prevention Program

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Identity Theft and Online Security

Identity Theft and Online Security

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

ID Theft and Data Breach Mitigation

Privacy: Pre- and Post-Breach

lifeid Foundation FAQ v.1

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Cyber Security Basics. Presented by Darrel Karbginsky

DeMystifying Data Breaches and Information Security Compliance

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Newcomer Finances Toolkit. Fraud. Worksheets

CONTENTS. SETUP SECURITY ENHANCEMENTS Existing User New User (Enrolled by Employer or Self)... 18

Mint Getting Started Guide for Financial Institutions. Financial Institution Support OFX Connectivity Group

ISACA West Florida Chapter - Cybersecurity Event

Your security on click Jobs

BBP Admin Participant Portal. Simplify your healthcare finances with convenient, online access to your tax-advantaged benefit account

Why you MUST protect your customer data

Difference Card Mobile

Client Resources. participant guide

Cyber Insurance: What is your bank doing to manage risk? presented by

Deluxe Provent Customer Notifications

Harvard University HSA Guide

Legal Considerations and Case Studies

JANUARY 2018 TABLE OF CONTENTS

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?

CONTENTS INTERNET BANKING GUIDE

Experian Fraud Prevention Solutions

Navigate our app like a pro. How-to s, guides and more. Certified by J.D. Power* for providing An Outstanding Mobile Banking Experience.

Best Practices Guide to Electronic Banking

Employer Portal Guide

Get the most from your Health Savings Account. Your guide to your HSA and online account access

IT SECURITY FOR LIBRARIES PART 1: SECURING YOUR LIBRARY BRIAN PICHMAN EVOLVE PROJECT

New User Quick Reference Guide Opening your HSA

STEVE GOODING JUNE 15, 2018

Are You Avoiding These Top 10 File Transfer Risks?

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs) Page 1 of 9

FAQ. Usually appear to be sent from official address

Healthcare HIPAA and Cybersecurity Update

HSA Bank MEMBER GUIDEEMBER GUIDE CUSTOMER WEBSITE GUIDE. Table of Contents

Fraud Mobility: Exploitation Patterns and Insights

Red Flags/Identity Theft Prevention Policy: Purpose

Who We Are! Natalie Timpone

CardValet Self-Service FAQs

Financial scams. What to look for and how to avoid them.

Legal Aspects of Cybersecurity

Cybersecurity The Evolving Landscape

Securing Americans Identities: The Future of the Social Security Number

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

IDENTITY THEFT PREVENTION Policy Statement

Enroll in Two factor Authentication - iphone

Reducing Cyber Risk in Your Organization

Cyber Crime Seminar. No Victim Too Small Why Small Businesses Are Low Hanging Fruit


Frequently Asked Questions. OPM Data Breach. Department of the Navy

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs)

Controlling Website Account Information. A recent survey done by Privacy Rights Clearinghouse shows that in the past five years

FF Flex Mobile App. Easily manage your healthcare benefit account from your mobile phone!

Protecting Digital Assets

Red Flag Regulations

Breaches and Remediation

Identity Theft Policies and Procedures

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

A Truly Innovative Approach to Executive Education & Professional Training. How to use Learning Management System

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

10 Quick Tips to Mobile Security

What is Realm? Realm is here!

Employee Portal New User Guide

Baptist Financial Services

Securing Identities in the Cloud: Simple Methods, Satisfied Customers VASCO Data Security

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

ANNUAL SECURITY AWARENESS TRAINING 2012

(electronic mail) is the exchange of computer-stored messages by telecommunication.

What to do if your business is the victim of a data or security breach?

Seattle University Identity Theft Prevention Program. Purpose. Definitions

The Data Breach: How to Stay Defensible Before, During & After the Incident

Transcription:

The most extensive identity protection plan available

AGENDA Identity theft About InfoArmor PrivacyArmor coverage Portal walkthrough Q&A

Sharing data is now a fact of daily life. Our work requires personal information. We build relationships through machines. We share more data in more ways every day.

EVERY 60 SECONDS 350,000 tweets 400 hours 210,000 snaps 65,000 posts 243,000 photos

56% of adults don t actively think about the risks of their online activities. 1 1 http://www.pewinternet.org/2014/04/03/older-adults-and-technology-use/

20 M+ PEOPLE ARE MORE CONNECTED THAN EVER BEFORE Amazon Echos sold through Q3 2017 244 M Install base of smart home devices in U.S. by 2022 (24M in 2016) Source: Forrester Data: Smart Home Devices Forecast, 2017 To 2022 (US)

85% of hackers named humans as the biggest security weakness. Source: Blackhat 2017, Hacker Survey Report, 2017

22 % 34 % Denied personal Took time off from work Reported stressrelated sleep disturbances 16.7 Million U.S. victims lines of credit 48 % in 2017 15 % Sold personal Source: the Identity Theft Resource Center s Identity Theft: the Aftermath report Additional Source: Javelin Strategy & Research 2018 Identity Fraud: Protecting Vulnerable Populations possessions to pay for expenses

Identity theft is: Financial accounts opened in your name Credit cards opened in your name Medical care provided in your name Someone arrested provides your personal information Someone uses your Social Security number to file for government services Someone files taxes in your name Someone creates a new identity by combining your information with someone else s (synthetic fraud) Identity theft is not: Fraudulent credit or debit card transactions Public information online Your personal account(s) being sent to collections for lack of payment Scams (phone, email, etc.) Hacked electronics or theft Hacked email *Note: if a victim gives out PII in a scam, or through a hack, this could become identity theft if acted upon

ABOUT US Founded in 2008 Focus on providing identity protection as a benefit A+ rating with Better Business Bureau Our complete focus is on keeping your personal information secure 100% U.S. based 100% Post-remediation satisfaction.5% Identity theft incidence rate among our members, as opposed to a 6.6% national average

Seriously secure SSAE18 SOC 1 and SOC 2 Type 2 accredited, updated annually WORLD-CLASS SECURITY Security is our top priority and a part of everything we do Relentlessly reliable Perfect track record with zero security incidents, and 99.99% site uptime Two-factor authentication For even stronger protection and peace of mind

THE LOGIN PROCESS Why two-factor authentication? It helps us keep your accounts more secure

PORTAL DASHBOARD Alerts sent via email or text message Log in or use our app to address alerts

CREDIT MONITORING Credit Monitoring includes: Credit score Credit report Notifications when we detect credit activity

DARK WEB MONITORING Enter information for credentials like email addresses, driver s licenses, credit cards, passports, and other sensitive information. We ll monitor the dark web and alert you should they become compromised. If you lose your wallet, the stored information allows us to help you replace the lost contents.

FINANCIAL TRANSACTIONS Add financial account information for accounts you would like monitored Default thresholds automatically appear Adjust your thresholds with the dropdowns

DIGITAL EXPOSURE REPORT Generates information from: The searchable internet, i.e. what shows up in Google, Bing, etc. Public records Social media sites Employment sites like CareerBuilder

SOCIAL MONITORING Monitor social accounts for anyone covered We look for alcohol references, bigotry, bullying, sexual connotations, grooming behavior, threats, and more Great feature for families with children who use social media

How to get the most out of PrivacyArmor Activate Credit Monitoring for fully-authenticated alerts Add credentials to Dark Web Monitoring for alerts when things like your email or passwords are compromised Set up financial account monitoring through Financial Transactions Add any enrolled family members Subscribe to text alerts Download our app to address alerts from anywhere

FULL-SERVICE REMEDIATION Training CITRMS (Certified Identity Theft Risk Management Specialist) Industry best practices in identity remediation Security protocols Case management In-house InfoArmor employees Accept all pre-existing conditions Limited Power of Attorney Dedicated Privacy Advocate Persistent creditor and merchant follow-up Alerts via email, text, and phone

PrivacyArmor by InfoArmor Questions? You can reach InfoArmor by calling 800-789-2720 www.infoarmor.com